虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

does

  • The PCI Special Interest Group disclaims all warranties and liability for the use of this document

    The PCI Special Interest Group disclaims all warranties and liability for the use of this document and the information contained herein and assumes no responsibility for any errors that may appear in this document, nor does the PCI Special Interest Group make a commitment to update the information contained herein.

    标签: warranties disclaims liability Interest

    上传时间: 2013-12-26

    上传用户:leixinzhuo

  • A bluetooth SMS patcher Java ME application I made quickly after I thought about making one. What i

    A bluetooth SMS patcher Java ME application I made quickly after I thought about making one. What is does is to use JSR-82 (Bluetooth API) to send a String msg, String dest to another phone running shin-chan, and this phone will try to send it as SMS using JSR-135 (WMA). The upload is a Netbeans 6.0 (the ver. available back then) project. Hope this code will help someone

    标签: application bluetooth patcher quickly

    上传时间: 2013-12-18

    上传用户:kelimu

  • face detection Face detection can be regarded as a more general case of face localization In face

    face detection Face detection can be regarded as a more general case of face localization In face localization, the task is to find the locations and sizes of a known number of faces (usually one). In face detection, one does not have this additional information. Early face-detection algorithms focused on the detection of frontal human faces, whereas newer algorithms attempt to solve the more general and difficult problem of multi-view face detection. That is, the detection of faces that are either rotated along the axis from the face to the observer (in-plane rotation), or rotated along the vertical or left-right axis (out-of-plane rotation),or both.

    标签: detection face localization regarded

    上传时间: 2014-01-10

    上传用户:wfeel

  • WordCloud is a visual depiction of how many times a word is used, or its frequency if you will, with

    WordCloud is a visual depiction of how many times a word is used, or its frequency if you will, within a given set of words. It does this by: reading in plain text, filtering out "stop words", counting how many times a word is used, and displaying results in a Squarified Treemap.

    标签: WordCloud depiction frequency visual

    上传时间: 2017-09-03

    上传用户:cc1915

  • An Overview of Smart Card Security. The smart card, an intelligent token, is a credit card sized

    An Overview of Smart Card Security. The smart card, an intelligent token, is a credit card sized plastic card embedded with an integrated circuit chip. It provides not only memory capacity, but computational capability as well. The self-containment of smart card makes it resistant to attack as it does not need to depend upon potentially vulnerable external resources. Because of this characteristic, smart cards are often used in different applications which require strong security protection and authentication.

    标签: card intelligent Overview Security

    上传时间: 2017-09-25

    上传用户:busterman

  • 网络爬虫编程

    网络爬虫 网络爬虫在CPP中爬行链接到你想要的深度。控制台应用程序   Ubuntu 14.04 LTS上编译的程序   用g+编译器编译 相依性   卷曲   Boost图书馆 用于编译的命令   G+爬虫.cpp-lcurl-lost_regex-o爬虫 输入   URL:您想要抓取示例“dirghbuch.com”的URL   链接数:要从爬行中提取的每页链接数   深度:我们想爬多深,在哪里深度可以定义为树的深度。 输出量   crawler.txt 限制   链接数最多可达100。   does not work for website which has blocked curl crawling for example google.com yahoo.com   由于缺乏并行性,所以速度很慢。   没有完整URL的链接被追加到用户在大容量中插入的URLwww.xyz.com有/conatct-us的网址将是www.xyz.com/contact-us   唯一的单词也包含html标记。 可能的改进,但尚未落实   限制共享变量的使用   改进使其易于并行化   比卷曲更有效的爬行方式

    标签: 网络爬虫 编程

    上传时间: 2018-06-20

    上传用户:1370893801

  • Feedback+Strategies+for+Wireless+Communication

    During the past decade, many wireless communication techniques have been developedto achievevariousgoals suchas higherdata rate,morerobustlink quality, and higher number of users in a given bandwidth. For wireless communication systems, depending on the availability of a feedback link, two approaches can be considered: namely open and closed loop. Open loop communication system that does not exploit the channel knowledge at the transmitter is now well understood from both a theoretical and practical point of view. 

    标签: Communication Strategies Feedback Wireless for

    上传时间: 2020-05-27

    上传用户:shancjb

  • History of Wireless

    The  motivation to write about the History  of  Wireless comes from Auguste Comte (1798-1857), a French philosopher who is termed the father  of  positivism and modem sociology  [Les Maximes d'Auguste Comte  (Auguste Comte's Mottos),  http://www.membres.lycos.fr/clotilde/l: On  ne connaitpas complgtement une science tant qu'on n'en saitpas l'histoire. (One does not know completely a science as long as one does not  know  its history.)

    标签: Wireless History of

    上传时间: 2020-05-27

    上传用户:shancjb

  • IMS+Multimedia+Telephony+over+Cellular+Systems

    This preface is somewhat different from prefaces found in similar books because it does not focus so much on the content of the book.We have instead chosen to write a few words about our own experiences from working with telephony services over Internet Protocol (IP). Here are our stories.

    标签: Multimedia Telephony Cellular Systems over IMS

    上传时间: 2020-05-27

    上传用户:shancjb

  • Electricity+Markets+Theories

    Why did an electricity market emerge? How does it really work? What are the perfor- mance measures that we can use to tell that the electricity market under consideration is well functioning? These are the questions that will be explored in this book. The main purpose of this book is to introduce the fundamental theories and concepts that underpintheelectricitymarketswhicharebasedonthreemajordisciplines:electrical power engineering, economics, and optimization methods.

    标签: Electricity Theories Markets

    上传时间: 2020-06-07

    上传用户:shancjb